Best Practices for Business-Driven Identity & Access Management

  • LANGUAGE: English DATE: Tuesday, November 06, 2012 TIME: 16:00 CET, 10am EST
Upcoming Webinars

Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access Management in global organizations.

As they face more security threats and regulatory challenges than ever, enterprises today are implementing Identity & Access Management (IAM) solutions built around business context. By doing so, companies can empower line of business owners to take ownership of identity and access control, and provide full business context across Identity and Access Management systems. The end result is greater business and IT alignment, reduced risk of security breaches, increased compliance assurance and significantly lower total cost of ownership for IAM initiatives.

Join KuppingerCole Pricipal Analyst Martin Kuppinger, and Deepak Taneja, Chief Technology Officer for Aveksa, as they explore past and future approaches to Identity Management, recommend approaches that have been successful for global organizations, and provide best practices for a business-driven approach to Identity and Access Management.


Speakers

Deepak Taneja is the Founder and CTO of Aveksa, a security compliance software company. Prior to founding Aveksa, he was CTO and VP of Engineering at Netegrity. In this role, he was instrumental in growing the company into the market leader in Identity and Access Management. Previously he...


Gold Sponsor

Aveksa was founded by a team of identity and access management pioneers, whose successful track records include Netegrity, Banyan Systems and PowerSoft. They recognized that businesses are struggling to achieve security governance across the enterprise, and are unable to efficiently or effectively manage the risk of inappropriate access to enterprise information resources.

From the time of our founding, we’ve focused on helping security teams and business managers collaborate on these objectives, through the automation of the many critical, yet manual tasks associated with access delivery, change management and compliance across the entire enterprise. We believe that in order to rapidly respond to business and regulatory demands, IT security organizations need an Enterprise Access Governance solution, to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation.

We provide the industry's most comprehensive, enterprise-class, access governance and management solution, helping IT organizations reduce access management complexity and increase operational efficiency, while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands.

Since 2006, when we released the first version of our product, we’ve been working hard to make our vision a reality. Our Enterprise Access Governance solutions are distinct in the following ways:

  • We make line-of-business managers key participants in access governance
  • We support ALL enterprise entitlements and roles; and enable role-based governance
  • We provide reports, certifications and analytics that are easily understood by business users
  • We enable and track entitlement changes
  • Our solutions are designed for fast deployment and massive scale
  • We embrace, complement and integrate with identity management and change management systems
  • Aveksa's growing customer base includes leading organizations in financial services, health care and manufacturing. Our customers tell us that “we get it.” We think you will too

Continuing Education Credits

After attending this webinar you will be able to:

  • Understand the changing requirements for Identity and Access Management solutions in global organizations.
  • Describe how to let the business take ownership of  identity and access control.
  • Evaluate the advantages of a greater business and IT alignment.

This event qualifies for 1 Group Internet Based CPE

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: lk@kuppingercole.com

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust for the Workforce

While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00